ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
162,701 | CVE-2021-31180 | 7.8 | 6.8 | HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,702 | CVE-2021-31181 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,703 | CVE-2021-31182 | 7.1 | 4.8 | HIGH | Microsoft Bluetooth Driver Spoofing Vulnerability | NVD-CWE-noinfo |
162,704 | CVE-2021-31183 | 7.5 | 5 | HIGH | Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33772, CVE-2021-34490. | NVD-CWE-noinfo |
162,705 | CVE-2021-31184 | 5.5 | 2.1 | MEDIUM | Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability | CWE-200 |
162,706 | CVE-2021-31185 | 5.5 | 2.1 | MEDIUM | Windows Desktop Bridge Denial of Service Vulnerability | NVD-CWE-noinfo |
162,707 | CVE-2021-31186 | 6.5 | 4.3 | MEDIUM | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | CWE-200 |
162,708 | CVE-2021-31187 | 7.8 | 7.2 | HIGH | Windows WalletService Elevation of Privilege Vulnerability | CWE-269 |
162,709 | CVE-2021-31188 | 5.5 | 2.1 | MEDIUM | Windows Graphics Component Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31170. | CWE-269 |
162,710 | CVE-2021-3119 | 7.5 | 5 | HIGH | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes a segmentation fault. | CWE-89 |
162,711 | CVE-2021-31190 | 7.8 | 4.6 | HIGH | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | CWE-269 |
162,712 | CVE-2021-31191 | 5.5 | 2.1 | MEDIUM | Windows Projected File System FS Filter Driver Information Disclosure Vulnerability | CWE-200 |
162,713 | CVE-2021-31192 | 7.8 | 6.8 | HIGH | Windows Media Foundation Core Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,714 | CVE-2021-31193 | 7.8 | 4.6 | HIGH | Windows SSDP Service Elevation of Privilege Vulnerability | CWE-269 |
162,715 | CVE-2021-31194 | 8.8 | 6.5 | HIGH | OLE Automation Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,716 | CVE-2021-31195 | 8.8 | 6.8 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31198. | NVD-CWE-noinfo |
162,717 | CVE-2021-31196 | 7.2 | 6.5 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31206, CVE-2021-34473. | NVD-CWE-noinfo |
162,718 | CVE-2021-31198 | 7.8 | 6.8 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31195. | CWE-77 |
162,719 | CVE-2021-31199 | 7.8 | 4.6 | HIGH | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31201. | CWE-269 |
162,720 | CVE-2021-3120 | 9.8 | 10 | CRITICAL | An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images. | CWE-434 |
162,721 | CVE-2021-31200 | 7.2 | 6.5 | HIGH | Common Utilities Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,722 | CVE-2021-31201 | 7.8 | 4.6 | HIGH | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31199. | CWE-269 |
162,723 | CVE-2021-31204 | 7.8 | 4.6 | HIGH | .NET and Visual Studio Elevation of Privilege Vulnerability | CWE-269 |
162,724 | CVE-2021-31205 | 6.5 | 4.3 | MEDIUM | Windows SMB Client Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
162,725 | CVE-2021-31206 | 8 | 7.9 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473. | NVD-CWE-noinfo |
162,726 | CVE-2021-31207 | 7.2 | 6.5 | HIGH | Microsoft Exchange Server Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
162,727 | CVE-2021-31208 | 7.8 | 4.6 | HIGH | Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31165, CVE-2021-31167, CVE-2021-31168, CVE-2021-31169. | CWE-269 |
162,728 | CVE-2021-31209 | 8.1 | 5.8 | HIGH | Microsoft Exchange Server Spoofing Vulnerability | NVD-CWE-noinfo |
162,729 | CVE-2021-3121 | 8.6 | 7.5 | HIGH | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | CWE-129 |
162,730 | CVE-2021-31211 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31214. | NVD-CWE-noinfo |
162,731 | CVE-2021-31213 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability | NVD-CWE-noinfo |
162,732 | CVE-2021-31214 | 7.8 | 9.3 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31211. | CWE-77 |
162,733 | CVE-2021-31215 | 8.8 | 6.5 | HIGH | SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling. | NVD-CWE-noinfo |
162,734 | CVE-2021-31216 | 8.1 | 5.5 | HIGH | Siren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host. | CWE-918 |
162,735 | CVE-2021-31217 | 9.1 | 9.4 | CRITICAL | In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM. | CWE-276 |
162,736 | CVE-2021-3122 | 9.8 | 10 | CRITICAL | CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration." | CWE-78 |
162,737 | CVE-2021-31220 | 5.2 | 2.3 | MEDIUM | SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies. | NVD-CWE-noinfo |
162,738 | CVE-2021-31221 | 5.7 | 2.9 | MEDIUM | SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed. | NVD-CWE-noinfo |
162,739 | CVE-2021-31222 | 5.7 | 2.9 | MEDIUM | SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed. | NVD-CWE-noinfo |
162,740 | CVE-2021-31223 | 5.7 | 2.9 | MEDIUM | SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed. | NVD-CWE-noinfo |
162,741 | CVE-2021-31224 | 3.5 | 2.9 | LOW | SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies. | NVD-CWE-noinfo |
162,742 | CVE-2021-31225 | 7.3 | 4.3 | HIGH | SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed. | NVD-CWE-noinfo |
162,743 | CVE-2021-31226 | 9.8 | 7.5 | CRITICAL | An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call. | CWE-787 |
162,744 | CVE-2021-31227 | 7.5 | 5 | HIGH | An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy. | CWE-787 |
162,745 | CVE-2021-31228 | 7.5 | 5 | HIGH | An issue was discovered in HCC embedded InterNiche 4.0.1. This vulnerability allows the attacker to predict a DNS query's source port in order to send forged DNS response packets that will be accepted as valid answers to the DNS client's requests (without sniffing the specific request). Data is predictable because it is based on the time of day, and has too few bits. | CWE-345 |
162,746 | CVE-2021-31229 | 6.5 | 4.3 | MEDIUM | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant. | CWE-787 |
162,747 | CVE-2021-31231 | 5.5 | 2.1 | MEDIUM | The Alertmanager in Grafana Enterprise Metrics before 1.2.1 and Metrics Enterprise 1.2.1 has a local file disclosure vulnerability when experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | CWE-20 |
162,748 | CVE-2021-31232 | 5.5 | 2.1 | MEDIUM | The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | CWE-20 |
162,749 | CVE-2021-3124 | 5.4 | 3.5 | MEDIUM | Stored cross-site scripting (XSS) in form field in robust.systems product Custom Global Variables v 1.0.5 allows a remote attacker to inject arbitrary code via the vars[0][name] field. | CWE-79 |
162,750 | CVE-2021-31245 | 5.9 | 4.3 | MEDIUM | omr-admin.py in openmptcprouter-vps-admin 0.57.3 and earlier compares the user provided password with the original password in a length dependent manner, which allows remote attackers to guess the password via a timing attack. | CWE-287 |
162,751 | CVE-2021-31249 | 6.5 | 6.4 | MEDIUM | A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components. | NVD-CWE-Other |
162,752 | CVE-2021-3125 | 7.5 | 4.3 | HIGH | In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | CWE-834 |
162,753 | CVE-2021-31250 | 5.4 | 3.5 | MEDIUM | Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi. | CWE-79 |
162,754 | CVE-2021-31251 | 9.8 | 7.5 | CRITICAL | An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated. | CWE-287 |
162,755 | CVE-2021-31252 | 6.1 | 5.8 | MEDIUM | An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it. | CWE-601 |
162,756 | CVE-2021-31254 | 7.8 | 6.8 | HIGH | Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes. | CWE-787 |
162,757 | CVE-2021-31255 | 7.8 | 6.8 | HIGH | Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | CWE-120 |
162,758 | CVE-2021-31256 | 5.5 | 4.3 | MEDIUM | Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-119 |
162,759 | CVE-2021-31257 | 5.5 | 4.3 | MEDIUM | The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
162,760 | CVE-2021-31258 | 5.5 | 4.3 | MEDIUM | The gf_isom_set_extraction_slc function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
162,761 | CVE-2021-31259 | 5.5 | 4.3 | MEDIUM | The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
162,762 | CVE-2021-31260 | 5.5 | 4.3 | MEDIUM | The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
162,763 | CVE-2021-31261 | 5.5 | 4.3 | MEDIUM | The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command. | CWE-119 |
162,764 | CVE-2021-31262 | 5.5 | 4.3 | MEDIUM | The AV1_DuplicateConfig function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
162,765 | CVE-2021-3127 | 7.5 | 5 | HIGH | NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled. | CWE-863 |
162,766 | CVE-2021-31272 | 9.8 | 7.5 | CRITICAL | SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation. | CWE-22 |
162,767 | CVE-2021-31274 | 5.4 | 3.5 | MEDIUM | In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed. | CWE-79 |
162,768 | CVE-2021-3128 | 7.5 | 5 | HIGH | In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | CWE-834 |
162,769 | CVE-2021-3129 | 9.8 | 7.5 | CRITICAL | Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | NVD-CWE-noinfo |
162,770 | CVE-2021-31292 | 7.5 | 5 | HIGH | An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. | CWE-190 |
162,771 | CVE-2021-3130 | 5.9 | 4.3 | MEDIUM | Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible. | CWE-522 |
162,772 | CVE-2021-3131 | 7.5 | 5 | HIGH | The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter. | CWE-522 |
162,773 | CVE-2021-31315 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-787 |
162,774 | CVE-2021-31316 | 9.8 | 10 | CRITICAL | The unprivileged user portal part of CentOS Web Panel is affected by a SQL Injection via the 'idsession' HTTP POST parameter. | CWE-89 |
162,775 | CVE-2021-31317 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the VDasher constructor of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-843 |
162,776 | CVE-2021-31318 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the LOTCompLayerItem::LOTCompLayerItem function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-843 |
162,777 | CVE-2021-31319 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by an Integer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-190 |
162,778 | CVE-2021-31320 | 7.1 | 5.8 | HIGH | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the VGradientCache::generateGradientColorTable function of their custom fork of the rlottie library. A remote attacker might be able to overwrite heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-787 |
162,779 | CVE-2021-31321 | 7.1 | 5.8 | HIGH | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the gray_split_cubic function of their custom fork of the rlottie library. A remote attacker might be able to overwrite Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-787 |
162,780 | CVE-2021-31322 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-787 |
162,781 | CVE-2021-31323 | 5.5 | 4.3 | MEDIUM | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. | CWE-787 |
162,782 | CVE-2021-31324 | 9.8 | 10 | CRITICAL | The unprivileged user portal part of CentOS Web Panel is affected by a Command Injection vulnerability leading to root Remote Code Execution. | CWE-77 |
162,783 | CVE-2021-31327 | 5.4 | 3.5 | MEDIUM | Stored XSS in Remote Clinic v2.0 in /medicines due to Medicine Name Field. | CWE-79 |
162,784 | CVE-2021-31329 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php | CWE-79 |
162,785 | CVE-2021-3133 | 8.8 | 6.8 | HIGH | The Elementor Contact Form DB plugin before 1.6 for WordPress allows CSRF via backend admin pages. | CWE-352 |
162,786 | CVE-2021-31337 | 9.8 | 6.8 | CRITICAL | The Telnet service of the SIMATIC HMI Comfort Panels system component in affected products does not require authentication, which may allow a remote attacker to gain access to the device if the service is enabled. Telnet is disabled by default on the SINAMICS Medium Voltage Products (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions). | CWE-306 |
162,787 | CVE-2021-31338 | 7.8 | 4.6 | HIGH | A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.0 SP1). Affected devices allow to modify configuration settings over an unauthenticated channel. This could allow a local attacker to escalate privileges and execute own code on the device. | NVD-CWE-Other |
162,788 | CVE-2021-31339 | 4.3 | 4 | MEDIUM | A vulnerability has been identified in Mendix Excel Importer Module (All versions < V9.0.3). Uploading a manipulated XML File results in an exception that could expose information about the Application-Server and the used XML-Framework. | CWE-209 |
162,789 | CVE-2021-3134 | 7.8 | 4.6 | HIGH | Mubu 2.2.1 allows local users to gain privileges to execute commands, aka CNVD-2020-68878. | CWE-269 |
162,790 | CVE-2021-31340 | 7.5 | 5 | HIGH | A vulnerability has been identified in SIMATIC RF166C (All versions > V1.1 and < V1.3.2), SIMATIC RF185C (All versions > V1.1 and < V1.3.2), SIMATIC RF186C (All versions > V1.1 and < V1.3.2), SIMATIC RF186CI (All versions > V1.1 and < V1.3.2), SIMATIC RF188C (All versions > V1.1 and < V1.3.2), SIMATIC RF188CI (All versions > V1.1 and < V1.3.2), SIMATIC RF360R (All versions), SIMATIC RF615R (All versions > V3.0), SIMATIC RF680R (All versions > V3.0), SIMATIC RF685R (All versions > V3.0). Affected devices do not properly handle large numbers of incoming connections. An attacker may leverage this to cause a Denial-of-Service situation. | CWE-400 |
162,791 | CVE-2021-31341 | 4.3 | 4 | MEDIUM | Uploading a table mapping using a manipulated XML file results in an exception that could expose information about the application-server and the used XML-framework on the Mendix Database Replication Module (All versions prior to v7.0.1). | CWE-209 |
162,792 | CVE-2021-31342 | 8.8 | 6.8 | HIGH | The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-787 |
162,793 | CVE-2021-31343 | 8.8 | 6.8 | HIGH | The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-787 |
162,794 | CVE-2021-31344 | 5.3 | 5 | MEDIUM | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004) | CWE-843 |
162,795 | CVE-2021-31345 | 9.1 | 6.4 | CRITICAL | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006) | CWE-1284 |
162,796 | CVE-2021-31346 | 9.1 | 6.4 | CRITICAL | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007) | CWE-1284 |
162,797 | CVE-2021-31347 | 6.5 | 4.3 | MEDIUM | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap). | CWE-91 |
162,798 | CVE-2021-31348 | 6.5 | 4.3 | MEDIUM | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure). | CWE-91 |
162,799 | CVE-2021-31349 | 9.8 | 7.5 | CRITICAL | The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Technology Session Smart Router versions prior to 4.5.11, and all versions of 5.0 up to and including 5.0.1. | CWE-287 |
162,800 | CVE-2021-3135 | 6.1 | 4.3 | MEDIUM | An issue was discovered in the tagDiv Newspaper theme 10.3.9.1 for WordPress. It allows XSS via the wp-admin/admin-ajax.php td_block_id parameter in a td_ajax_block API call. | CWE-79 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.